MX2007011294A - Electronic proximity security system. - Google Patents
Electronic proximity security system.Info
- Publication number
- MX2007011294A MX2007011294A MX2007011294A MX2007011294A MX2007011294A MX 2007011294 A MX2007011294 A MX 2007011294A MX 2007011294 A MX2007011294 A MX 2007011294A MX 2007011294 A MX2007011294 A MX 2007011294A MX 2007011294 A MX2007011294 A MX 2007011294A
- Authority
- MX
- Mexico
- Prior art keywords
- receiver
- signal
- logic circuit
- further characterized
- security
- Prior art date
Links
- 238000004891 communication Methods 0.000 claims abstract description 24
- 238000004146 energy storage Methods 0.000 claims description 32
- 238000000034 method Methods 0.000 claims description 29
- 238000004134 energy conservation Methods 0.000 claims description 23
- 230000000903 blocking effect Effects 0.000 claims description 10
- 239000003990 capacitor Substances 0.000 claims description 8
- 238000011156 evaluation Methods 0.000 claims description 2
- 239000012190 activator Substances 0.000 description 21
- NTKSJAPQYKCFPP-UHFFFAOYSA-N 1,2,4,5-tetrachloro-3-(3-chlorophenyl)benzene Chemical compound ClC1=CC=CC(C=2C(=C(Cl)C=C(Cl)C=2Cl)Cl)=C1 NTKSJAPQYKCFPP-UHFFFAOYSA-N 0.000 description 5
- 230000005611 electricity Effects 0.000 description 4
- 238000012423 maintenance Methods 0.000 description 3
- 238000013459 approach Methods 0.000 description 2
- 238000013461 design Methods 0.000 description 1
- 230000006866 deterioration Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000005684 electric field Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00182—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
-
- A—HUMAN NECESSITIES
- A47—FURNITURE; DOMESTIC ARTICLES OR APPLIANCES; COFFEE MILLS; SPICE MILLS; SUCTION CLEANERS IN GENERAL
- A47G—HOUSEHOLD OR TABLE EQUIPMENT
- A47G29/00—Supports, holders, or containers for household use, not provided for in groups A47G1/00-A47G27/00 or A47G33/00
- A47G29/12—Mail or newspaper receptacles, e.g. letter-boxes; Openings in doors or the like for delivering mail or newspapers
- A47G29/1209—Rural letter-boxes
-
- A—HUMAN NECESSITIES
- A47—FURNITURE; DOMESTIC ARTICLES OR APPLIANCES; COFFEE MILLS; SPICE MILLS; SUCTION CLEANERS IN GENERAL
- A47G—HOUSEHOLD OR TABLE EQUIPMENT
- A47G29/00—Supports, holders, or containers for household use, not provided for in groups A47G1/00-A47G27/00 or A47G33/00
- A47G29/14—Deposit receptacles for food, e.g. breakfast, milk, or large parcels; Similar receptacles for food or large parcels with appliances for preventing unauthorised removal of the deposited articles, i.e. food or large parcels
- A47G29/141—Deposit receptacles for food, e.g. breakfast, milk, or large parcels; Similar receptacles for food or large parcels with appliances for preventing unauthorised removal of the deposited articles, i.e. food or large parcels comprising electronically controlled locking means
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B64—AIRCRAFT; AVIATION; COSMONAUTICS
- B64C—AEROPLANES; HELICOPTERS
- B64C1/00—Fuselages; Constructional features common to fuselages, wings, stabilising surfaces or the like
- B64C1/14—Windows; Doors; Hatch covers or access panels; Surrounding frame structures; Canopies; Windscreens accessories therefor, e.g. pressure sensors, water deflectors, hinges, seals, handles, latches, windscreen wipers
- B64C1/1407—Doors; surrounding frames
- B64C1/1469—Doors between cockpit and cabin
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
- G07C9/00912—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for safes, strong-rooms, vaults or the like
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00634—Power supply for the lock
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Mechanical Engineering (AREA)
- Aviation & Aerospace Engineering (AREA)
- Food Science & Technology (AREA)
- Lock And Its Accessories (AREA)
- Burglar Alarm Systems (AREA)
Abstract
A system for controlling access to a securable area. The system includes a transmitter, a receiver, a logic circuit, an energy storing device, and a locking mechanism. The transmitter remotely transmits a signal that is selectively received by the receiver. The receiver includes an active and an inactive state. The logic circuit is in communication with the receiver and includes an active and an inactive state. The logic circuit is in communication with the energy storing device, which is in communication with the locking mechanism. When the receiver receives the signal from the transmitter, the locking mechanism selectively allows access to the securable area.
Description
ELECTRONIC PROXIMITY SECURITY SYSTEM
CROSS REFERENCE FOR RELATED APPLICATIONS
This non-provisional patent application claims the benefit of the
Provisional patent application of E.U.A. No. 60 / 594,186 entitled "Batteryless Electronic Proximity Security Device", filed on March 17, 2005.
FIELD OF THE INVENTION
The present invention is generally related to remotely locking and unlocking an area that can be secured. The present invention relates specifically to the evaluation of security codes to determine whether or not to secure an area that can be secured.
BACKGROUND OF THE INVENTION
The areas that can be secured, such as containers, rooms, patios and the like, are often secured by a locking device. Blocking devices typically include apparatus and methods for locking and unlocking the device. Normally, methods require that a person seeking to block and unblock
a lock is placed very close to the device. For example, a key lock or combination lock requires that a person be close enough to the lock to physically manipulate the lock with a suitable key or enter a combination to lock or unlock the locking device. It is convenient to develop devices and methods to secure or remotely release an area that can be secured. Devices and methods that have been designed and developed to remotely secure or release a commonly assurable area require a power source, typically electrical energy stored in a battery, to lock and unlock a locking device. Such systems may require frequent maintenance and the service time is often limited by the battery life. It is desirable to develop apparatus and methods to remotely secure or release an area that can be assured to limit the amount of maintenance required and that limit the energy needed to energize said apparatuses and methods.
BRIEF DESCRIPTION OF THE INVENTION
The present invention is directed to the apparatuses and methods, to secure and release an area or space that can be secured. The devices and methods are designed to control access to the area that is
You can secure remotely from a location generally next to the area that can be secured. Optionally energy and energy conservation devices and methods are included in the apparatuses and methods described herein. One embodiment of the invention provides an energy conservation system for controlling access in an area that can be secured. The system includes a transmitter, a receiver, a logic circuit, an energy storage device and a locking mechanism. The transmitter transmits remotely a signal that is received selectively by the receiver. The receiver includes an active state and an inactive state. The logic circuit is in communication with the receiver and includes an active state and an inactive state. The logic circuit is in communication with the energy storage device, which is in communication with the locking mechanism. When the receiver receives the signal from the transmitter, the blocking mechanism selectively allows access to the area that can be secured.
BRIEF DESCRIPTION OF THE DRAWINGS
In the accompanying drawings, which are incorporated and constitute a part of this specification, the embodiments of the present invention are illustrated, which, together with a general description of the present invention presented above and
the detailed description presented below, serve to illustrate the principles of the present invention The drawings and the detailed description do not pretend and do not limit the scope of the present invention or the claims in any way Instead, the drawings and the detailed description only describe the embodiments of the present invention and other embodiments of the present invention not described are encompassed by the claims. Figure 1 is a schematic representation of an example embodiment of an electronic proximity security system. according to the present invention, figure 2 is a schematic representation of a signal used in the system of figure 1, figure 3A is a schematic representation of an example embodiment of a closing mechanism of figure 1, in the locked position, Figure 3B is a schematic representation of an example embodiment of a closing mechanism of Figure 1, in the unlocked position. Figures 4A and 4B are flow diagrams showing a method of use. Example of the system of Figure 1, Figure 5 is a perspective view of the system of Figure 1 applied to a mailbox, Figure 6 , is an exploded view of the mailbox of Figure 5,
Figure 7 is a cross-sectional view of the mailbox of Figure 5, with the door blocked; and Figure 8 is a cross-sectional view of the mailbox of Figure 5, with the door unlocked.
DETAILED DESCRIPTION OF THE MODALITIES
The detailed description of the present invention simply describes the preferred embodiments of the present invention and is not intended to limit the scope of the claims in any way. In fact, the present invention as described by the claims is broader and unlimited by the preferred embodiments and the terms in the claims have their full ordinary meaning. As described herein, the apparatuses and methods can be designed to remotely lock and unlock an area or space that can be secured, such as, for example, rooms, fenced yards, storage tanks, containers and the like. Said areas that can be secured are normally secured by blocking an access device, such as, for example, a door, a hatch and the like. Devices and methods for locking and unlocking remotely can be configured in such a way that only authorized persons have the ability to lock or unlock the area that can be secured. When a
attempt to unlock the area that can be secured, the devices and methods used are subject to an authentication procedure to determine if the area that can be secured should be unlocked. Said apparatuses and methods are normally based on energy, such as electric power, to energize the authentication procedure and the blocking and unblocking of the area that can be secured. The conservation of energy, limiting the amount of energy or power needed to authenticate a user or block and unblock the area that can be assured, can extend the life of these devices and reduce the occurrences of time out of service due to depletion of the power supply. Additionally, conserving energy can reduce the amount of maintenance by limiting the frequency at which a power supply, such as an electric battery, needs to be changed. Figure 1 illustrates a schematic representation of an example embodiment of an electronic proximity security system or assembly 10. The security system 10 includes a space or area that can be secured 12 and an access device 14 by which, the area that can be secured is accessed 12. The terms "secure area 12" and "access device 14" represent a wide variety of components. For the purposes of the description of Figure 1, the area that can be secured 12 will be called a container and the access device 12 will be called a door.
The security system 10 is remote in the sense that an authorized user can lock and unlock the door 14 of the container 12 without having physical contact with the door 14 or container 12. Preferably, a user can lock and unlock the door 14 only when the user is near the container 12 For example, the system 10 can be configured to allow a user to unlock the door 14 only when the user is within a radius of three meters of the container 12 To achieve remote locking and unlocking of the door 14, the system 10 includes a transmitter 16, a receiver 18, a logic circuit 20, an energy storage device 22, an activator 24 and a closing mechanism 26 The method for locking the door 14 begins with the transmitter 16 that generates a signal 28 that can be received by the receiver 18 The receiver 18 receives the signal 28 when the receiver 18 is within the range of the transmitter 16 Com or will be described in detail, the signal 28 contains the information used by the receiver 18 and other elements of the system 10 to authenticate a user and determine if the door 14 is to be unlocked. The receiver 18 is in electrical communication with the logic circuit 20. Once the receiver 18 receives the information carried by the signal 28, the receiver 18 and, optionally, the logic circuit 20 can interpret the information to authenticate the signal 28 as originating from an authorized transmitter 16 or authorized user. The logic circuit 20 is in electrical communication with the energy storage device 22, which is in
electrical communication with the activator 24. The activator 24 is coupled to the closing mechanism 26, which physically locks and unlocks the door 14. The activator 24 controls the position of the closing mechanism 26, which determines whether the door 14 is blocked or unlocked. If the signal 28 is authenticated, the logic circuit 20 commands the energy storage device 22 to deliver the energy to the activator 24. This energy energizes the activator 24 to place the closing mechanism 26 in such a way that the door 14 is unlocked . In alternative configurations, the energy storage device 22 can stop energizing the activator 24 or alter the energy delivered to the activator 24 to cause the door 14 to unlock. If the signal 28 can not be authenticated by the receiver 18 and / or the logic circuit 20 does not take actions to unlock the door 14. All procedures of receiving the signal 28, evaluating the information and unlocking the door 14 consume energy and power. The components of the security system 10 can be configured to minimize the use of energy and power. Some areas that can be secured 10 may require unlocking on a few occasions. For example, a secured mailbox can only be unlocked twice a day, once when the postal vehicle delivers the mail and once when the recipient picks up the mail. For the vast majority of the day, these containers may remain blocked. If the receiver 18 and the circuit
logical 20 remain active all the time, the energy used to maintain this active state could be wasted, with the exception of the two moments per day when the container 12 is unlocked. To minimize the energy used by the receiver 18 and the logic circuit 20, each is configured to have an active state and an inactive state or dormant state. When the receiver 18 and the logic circuit 20 are in active state, the information of the signal 28 can be interpreted and used to make decisions. When the receiver 18 and the logic circuit 20 are in the inactive state, the information can not be interpreted. In order for this configuration to be useful, the receiver 18 and the logic circuit 20 need to be activated, or moved from the inactive state to an active state, when the information requires interpretation. One method for moving the receiver 18 from an inactive state to an active state is to use a portion of the signal 28 transmitted from the transmitter 16 to activate the receiver 18. A schematic representation of a signal 28 is illustrated in FIG. 2. first portion 30 of signal 28 is an unmodulated sine wave. This unmodulated portion does not carry any information. This first portion 30 is designed to provide power to the receiver 18 to activate the receiver 18 and move it from an inactive state to an active state. Once the receiver 18 is in the active state, the receiver 18 receives a second portion 32 of the signal 28. This second portion 32 of the signal 28 is modulated and contains a first security code that is read and interpreted by the receiver 18. The receiver 18 compares the first
security code with a first access code stored in the receiver 18. Optionally, the energy required to interpret the first security code and compare it with the first access code can be derived from the signal 28. This minimizes the energy required from the energy storage device 22 to operate the system 10. If the first security code does not correspond to the first access code, the receiver 18 returns to the inactive state. If the first security code corresponds to the first access code, the user is partially authenticated and the receiver 18 sends a message to the logic circuit 20 to activate the logic circuit 20 and move it from an inactive state to an active state. Additionally, the receiver 18 receives a third portion 34 of the signal 28 and passes that portion 34 to the logic circuit 20. The third portion 34 of the signal 28 is modulated and contains a second security code. The second security code is interpreted by the logic circuit 20 and compared to the second access code stored in the logic circuit 20. Alternatively, the second access code may be stored in a non-volatile memory circuit 36 that is in communication with the logic circuit 20. If the second security code does not correspond to the second access code, the logic circuit 20 takes no action and returns to an inactive state. If the second security code corresponds to the second access code, the user is authenticated completely and the logic circuit 20 sends a message to the storage device of the user.
energy 22 to energize the activator 24, which places the closing mechanism 26 to unlock the door 14. Although in the embodiment illustrated by figures 1 and 2 it describes a first and second safety codes, it should be understood that any number of codes Security can be incorporated into a signal. Additionally, the complexity of each security code can be varied to offer an appropriate amount of security. For example, an 8-bit code offers 256 unique codes, while a twenty-four-bit code offers almost 17 million unique codes. Optionally, the signal 28 may include information different from the security codes. For example, in a circumstance where there are multiple authorized users, the signal 28 may include information about the identity of the current users. This information can be stored in the non-volatile memory circuit 36 to form a retrospective access tracking for the container 12. This retrospective tracking can include the time and date of each access, the duration of the access and other different information. This retrospective tracking can be retrieved from the memory circuit 36 as necessary. The information in the retrospective follow-up can be presented through a deployment screen, a printed report, or other methods so that those people authorized by security can see said information. The activator 24 and the closing mechanism 26 can be configured to minimize the energy needed to maintain the
door 14 in a locked or unlocked position. If the electronic proximity security system 10 is a mailbox such as the one described above, the door 14 will remain locked for the greater part of the time and will be unlocked for a small part of the time. Under these circumstances, the use of energy can be reduced to a minimum if the closing mechanism 26 is placed to lock the door 14 when the energy storage device 22 is not energizing or supplying power to the activator 24. The use of energy by the actuator 24 may be limited to maintain closure mechanism 26 in a position that unlocks door 14. An example of such configuration is the use of a mechanical spring to position closure mechanism 26 in such a manner that door 14 is locked. When an authorized user requests that the door 14 be unlocked, the energy of the energy storage device 22 can energize the actuator 24 to overcome the force of the mechanical spring and place the closing mechanism 26 to unlock the door 14. Alternatively, the security system 10 can be used in such a way that the door 14 is unlocked most of the time. A mechanical spring can be positioned to maintain the closing mechanism 26 in a position where the door 14 is unlocked. Energizing activator 24 could move latch mechanism 26 to the position where door 14 is locked. The energy storage device 22 may be any device that has the ability to store energy. By
For example, you can use a single-use battery or a rechargeable battery. The single-use battery can energize the system 10 until its useful life runs out, at which time the exhausted single-use battery could be exchanged for a new single-use battery. The rechargeable battery can be connected to a power source that recharges the battery. Figure 1 illustrates a solar panel 38 attached to the energy storage device 22. The solar panel 38 transforms natural light into electricity and the electricity generated can be stored in a rechargeable battery 22. The electricity generated by the solar panel 38 passes through an energy conditioner 40 to adapt the energy for storage. The solar panel 38 is an example device for providing power to a rechargeable energy storage device 22. Other devices that can keep a rechargeable energy storage device charged 22, include a windmill and a power supply cord connected to an outlet. Optionally, the energy storage device 22 can be one or more super capacitors. Super capacitors can have a useful life of approximately 12 years. This exceeds the lifetime of a single-use battery or rechargeable battery. The closing mechanism 26 may be composed of standard mechanical components. Referring to FIGS. 3A and 3B, the closing mechanism 26 may include a plunger 42, at least partially positioned in the activator 24 and an L-shaped latch 44 coupled to
the door 14. As seen in figure 3A, when the activator 24 is not energized, a spring 46 places the plunger 42 in such a way as to secure the safety 44. As seen in figure 3B, when the activator 24 is energized a force F moves the plunger 42 downwards, with respect to figure 3B. This places the plunger 42 in such a way that the latch 44 is free and the door 14 is free to be opened by a user. This description is exemplary only and the closing mechanism can include any configuration of the components that can secure or free the access device 14 from a secure area 12. Optionally, the electronic proximity security system 10 can including an energy regulator 48 in communication with the energy storage device 22, the activator 24 and the logic circuit 20. The energy regulator 48 regulates the energy flowing from the energy storage device 22 to other components in the system 10 energized by the energy storage device 22. Referring to FIGS. 4A and 4B, a flow chart is shown which represents an exemplary method used in the embodiment shown in FIGS. 1 and FIG. 2. The transmitter 16 transmit signal 28 regulates the intervals in step 50. As seen in figure 2, signal 28 is sent in periods of time. po ti, t2, and t3. During the time period t, the signal is not sent. At the end of the period of time t4, the cycle is repeated by the transmitter 16. The duration of the time periods t-i, t2, t3, and t4, can be any duration. In one example, the durations of the
Time periods t, t2, and t3, are approximately 100 to 150 milliseconds each and the duration of time period t4 is approximately 1.5 seconds. Normally, an authorized person carries a transmitter 16. As an authorized person approaches the container 12, the time periods as described, allow the security system 10 to adapt the time to evaluate the signal 28 and unblock the signal. gate 14 before the user reaches the container 12 and attempts to open the door 14. When the signal 28 is transmitted by the transmitter 16, a check is made in step 52 to determine if the receiver 18 is in the signal range 28 If the receiver 18 is out of range, no action occurs. If the receiver is in the range, the receiver 18 receives the signal 28 in step 54. In step 56 a check is made to determine if the receiver 18 is in an active state. If the receiver is already in an active state, the receiver 18 receives the energy and the first security code in step 58. If the receiver 18 is in an inactive or latent state, the first portion 30 of the signal 28 places the receiver 18 in the active state in step 60. The receiver 18 then receives the energy and the first security code in step 58. The receiver 18 evaluates the first security code in step 62. In step 64, it is determined whether the First security code is correct or incorrect. If the first security code is incorrect, the receiver returns to the inactive state in step 66. If the first security code is correct, the logic circuit 20 is activated in step 68. The signal 28 provides the
logic circuit 20 the second security code 70 and logic circuit 20 evaluate the second security code in step 72. In step 74, it is determined whether the second security code is correct or incorrect. If the second security code is incorrect, the logic circuit 20 and the receiver 18 return to the inactive state in step 76. If the second security code is correct, the logic circuit 20 instructs the energy storage device 22 to energize the mechanism. blockage in step 78. This causes the secure area 12 to be unlocked in step 80. The logic circuit 20 continues to periodically sample the receiver 18 in step 82. In step 84 it is determined whether the second security code continues to be received by the receiver 18. If the second security code continues to be received, the logic circuit 20 does not make changes. If the second security code is no longer received, the logic circuit 20 instructs the energy storage device 22 to de-energize the blocking mechanism in step 86. The de-energization of the blocking mechanism 26 causes the area that can be blocked. ensure it is secured in step 88. Once the area that can be secured 12 is unlocked, the user can block the area that can be secured 12 by moving the transmitter 16 out of the range of the receiver 18. This can be achieved by simply walking outside of the area that can be secured 12 with the transmitter 16.
Figures 5 to 8 illustrate an exemplary embodiment of a mailbox 100 configured with an electronic proximity security system. As best seen in the perspective view of Figure 5 and the exploded view of Figure 6, the mailbox 100 includes an upper part of the mailbox 102, a lower part of the mailbox 104 and a door 106. The upper part of the mailbox 102 and the lower part of the mailbox 104 are coupled together and the door 106 is hinged to the upper part of the mailbox 102. The door 106 can be opened or closed along the arc A, as shown in figure 5. When the door 106 is closed, an area that can be secured 1 10 is defined by the top of the mailbox 102, the bottom of the mailbox 104 and the door 106. The mailbox 100 includes a printed circuit board (PCB) 112. The PBC 1 12 hosts the receiver 114, a logic circuit 116, a non-volatile memory circuit 118 and at least one super capacitor 120. The infrastructure of the PCB 112 places all the components 1 14, 116, 1 18 and 120 in communication between yes. As best seen in Figure 5, the PCB 112 is mounted on an inner surface 122 or the upper part of the mailbox 102. A cover plate 124 is mounted on the PCB 112 to protect the PBC 112 from deterioration and debris. A solar panel or cell 126 is mounted on an outer surface 128 of the upper part of the mailbox 102 and is in communication with the PCB 112. The solar cell 126 generates the energy that is channeled to the super capacitor 120 for storage. Optionally, they can be incorporated
additional renewable energy resources in mailbox 100. For example, additional solar cells can be added to generate more electricity or adjust for geographic areas of the country that may experience less sunlight. The piezo device 129 can be added to charge the super capacitor 120. The piezo device 129 can be added to any location where a force can be applied to the device. Said location is close to where the door 106 makes contact with the upper part of the mailbox 102 from the closure. A piezo device 129 can be configured in such a way that when the door 106 is opened or closed, a force is applied to the piezo device 129. This force generates an electric field that can be tapped, channel the super capacitor 120 and stored for the use future of the mailbox 100. Alternatively, a rechargeable battery can be used and recharged by the solar cell 126 and / or a piezo device, or other renewable energy sources. An activator 130 is mounted on the inner surface 122 of the upper part of the mailbox 102 near where the edge of the upper part 132 of the door 106 is positioned when the door 106 is closed. The activator 130 is in communication with the PCB 112. The closing mechanism includes a plunger 134, located at least partially within the activator 130 (as seen in FIGS. 7 and 8), and a slot or opening 136 in FIG. the edge of the upper part 132 of the door 106. The door 106 is locked when the door 106 is closed and the plunger 134 extends from the activator 130 and is placed in the slot 136 of the door 106, as shown in FIG.
shown in Figure 7. The door is not locked when the plunger 134 is retracted in the activator 130 and free from the slot 136 in the door 106, as shown in Figure 8. The transmitter (not shown) of this mode is a radio frequency transmitter. Normally, the transmitter is of a design commonly used by radio frequency identification (RFID) technology. The receiver 114 is an RFID receiver. The transmitted signal is a radio signal, with three portions, similar to the scheme illustrated in Figure 2, and includes the unmodulated active portion, together with a first and second security codes, as described herein. A secured mailbox 100 may be highly desirable. The mail received is often confidential or contains personal information, such as social security numbers and information on bank statements. Outgoing mail is often to the left of the mailbox to be collected by a postal vehicle. Outgoing mail also contains personal and sensitive information, such as checks and personal correspondence. Preferably, a secured mailbox 100 has the ability to protect the delivered mail as well as the outgoing mail. As described above, a mailbox is accessed as rarely as twice a day by two different authorized users, that is, a postal vehicle and the owner of the mailbox. If the postal vehicle had a transmitter that transmitted the appropriate security codes, the postal vehicle could unlock the mailbox 100 to deposit the incoming mail and remove the mail.
exit mail and then re-block mailbox 100. Similarly, the mailbox owner can unblock mailbox 100 with a transmitter to deposit the outgoing mail and / or retrieve the incoming mail and re-block the mailbox 100. A postal vehicle needs to service hundreds of mailboxes per day. Having a unique transmitter for each mailbox is impractical. Mailboxes can be configured to be opened by a generic code generated by an RFID transmitter from the post office. This allows the postal vehicle to open many mailboxes with the same transmitter. This system offers efficiency for the postal vehicle and the same level of security as the general current key system used by the US Postal Office. In this system, any mailboxes are configured to be unlocked by a general key used by postal vehicles. The use of RFID transmitters offers efficiencies over generic key systems. Because the transmitter repetitively sends the signal, the mailboxes 100 will open as the postal vehicle approaches the mailbox 100 without any additional affirmative actions, such as using a key to unlock the mailbox. In the embodiment shown, the mailbox 100 is configured in such a way that the door 106 remains closed even when the transmitter of the postal vehicle has the door 106 unlocked. The postal vehicle will need to pull a handle attached to the door 106 to open the mailbox 106. The door 106 can optionally be a loaded spring so that the door 106 closes automatically when the vehicle
postal has made the placement of the mail in the mailbox 100 and the recovery of the outgoing mail from the mailbox 100. A postal vehicle simply continues on the route and the movement of the transmitter out of reach of the receiver 114 will block the mailbox 100. The The transmitter used by the owner of the mailbox may not include the generic security code of the post office. The owner's transmitter may contain a security code specific to the owner's mailbox 100. Under this configuration, the receiver 114 and the logic circuit 1 16 recognize at least three codes as correct access codes: a security code evaluated by the receiver 114 to determine if the logic circuit 16 must be activated, a security code from the post office evaluated by the logic circuit 1 16 to grant access to the mailbox 100 to a postal vehicle, and a security code of the owner evaluated by the logic circuit 116 to grant access to the mailbox 100 for the owner. Optionally, the owner's transmitter can send only one command signal, as opposed to sending the signal in a repeating cycle. Because the owner will only use the transmitter once or twice a day, the transmitter can be configured in such a way that a button can be pressed to send the signal. This configuration minimizes the energy used by the owner's transmitter without disturbing the owner.
Although the apparatuses and methods are raised by reference to a mailbox 100, a mailbox 100 is used solely for illustrative purposes. It should be readily understood that said apparatuses and methods can be applied to a wide variety of areas that can be secured different from the mailboxes 100 Such as, for example, a room that can be secured by a door that can be locked, a fence in the yard that can be secured by a door that can be locked, and a warehouse that can be secured by bays that can be blocked Although several aspects of the present invention are described and illustrated in the present description as represented in combination with the example modalities, these various aspects can be realized in many alternative embodiments not shown., any individual form or in vain combinations and the sub-combinations thereof. Unless expressly excluded in the present description, all such combinations and sub-combinations are intended to be within the scope of the present invention. various alternative embodiments such as the various aspects and features of the present invention, such as alternative materials, structures, configurations, methods and devices, and so forth, may be described in the present description, such descriptions are not intended to fully or exhaustively relate the alternative modalities available, either currently known or subsequently developed Those experts in the field
they can easily adopt one or more of the aspects, concepts or features of the present invention in the additional embodiments within the scope of the present invention even if said embodiments are not expressly described in the present description. Furthermore, even though some features, concepts or aspects of the present invention may be described in the present description, as being the preferred configuration or method, said description is not intended to suggest that said features are required or necessary unless expressly indicated. . Still further, example or representative values and margins may be included to assist in the understanding of the present invention, however; said values and margins will not be interpreted in a limiting sense and are intended only to be critical values or margins if expressly indicated.
Claims (24)
1. - An energy conservation system to control access to an area that can be secured, characterized because it includes: a. a transmitter to transmit a signal remotely; b. a receiver for receiving the transmitted signal remotely, the receiver includes an active state and an inactive state; c. a logic circuit that includes an active state and an inactive state in communication with the receiver; d. an energy storage device in communication with the logic circuit; and e. a blocking mechanism in communication with the energy storage device; wherein when the receiver receives the signal from the transmitter, the blocking mechanism allows selective access to the area that can be secured.
2. The energy conservation system according to claim 1, further characterized in that the signal comprises: a. a first portion; b. a second portion; and c. a third portion.
3. The energy conservation system according to claim 2, further characterized in that the first portion of the signal changes the receiver from the inactive state to the active state if the receiver is in the inactive state.
4. - The energy conservation system according to claim 2, further characterized in that the second portion of the signal includes a first security code for evaluating the receiver; In addition, when the receiver evaluates the first security code, the receiver selectively switches the logic circuit from the inactive state to the active state if the logic circuit is in an inactive state.
5. The energy conservation system according to claim 3, further characterized in that the third portion of the signal includes a second security code for the evaluation of the logic circuit; In addition, when the logic circuit evaluates the second security code, the logic circuit selectively commands the energy storage device to open the locking mechanism to unlock the secure area.
6. The energy conservation system according to claim 4, further characterized in that the signal provides the energy to the receiver for the receiver to evaluate the first security code.
7. The energy conservation system according to claim 1, further characterized in that the energy storage device is a super capacitor.
8. The energy conservation system according to claim 1, further characterized in that it additionally comprises a solar cell; wherein the solar cell is in communication with the energy storage device.
9. - The energy conservation system according to claim 1, further characterized in that it further comprises a piezo device; wherein the piezo device is in communication with the energy storage device.
10. The energy conservation system according to claim 1, further characterized in that the area that can be secured is in an internal space of a mailbox.
11. The energy conservation system according to claim 1, further characterized in that the area that can be secured is in an internal space of a room. 12.- An energy conservation system to control access to an area that can be secured, characterized because it includes: a. an RFID transmitter to transmit a signal; b. an RFID receiver to receive the signal, the receiver includes an active state and an inactive state; c. a logic circuit that includes an active state and an inactive state and is in communication with the RFID receiver; d. an energy storage device in communication with the logic circuit; and e. a blocking mechanism in communication with the energy storage device; wherein when the RFID receiver receives the signal from the RFID transmitter, the blocking mechanism allows selective access to the area that can be secured. 13. The energy conservation system according to claim 12, further characterized in that the signal comprises: a. a first portion, which connects the receiver in the active state if the receiver is in an inactive state; b. a second portion, which includes a first security code to be evaluated by the RFID receiver; and c. a third portion, which includes a second security code to be evaluated by the logic circuit; wherein when the RFID receiver evaluates to the first security code, the RFID receiver selectively changes the logic circuit in the active state if the logic circuit is in the inactive state; wherein additionally, when the logic circuit evaluates the second security code, the logic circuit selectively commands the energy storage device to open the locking mechanism to release the secure area. 14. The energy conservation system according to claim 13, further characterized in that the signal provides the power to the RFID receiver for the RFID receiver to evaluate the first security code. 15. The energy conservation system according to claim 13, further characterized in that the RFID receiver evaluates the first security code by comparing the first security code with a first access code stored in the RFID receiver. 16. The energy conservation system according to claim 13, further characterized in that it additionally comprises a memory circuit; where the logic circuit evaluates the second code of security by comparing the second security code with a second access code stored in the memory circuit. 17. The energy conservation system according to claim 12, further characterized in that the energy storage device is at least one super capacitor. 18. The energy conservation system according to claim 12, further characterized in that it additionally comprises a solar cell; wherein the solar cell is in communication with the energy storage device. 19. The energy conservation system according to claim 12, further characterized in that it further comprises a piezo device; wherein the piezo device is in communication with the energy storage device. 20. The energy conservation system according to claim 12, further characterized in that the area that can be secured is in the internal space of a mailbox. 21. The energy conservation system according to claim 12, further characterized in that the area that can be secured is the internal space of a room. 22. A method for securing and releasing an access element, characterized in that it comprises: a. transmitting a signal from a transmitter to a security mechanism, where the signal provides the security mechanism with the power, places the security mechanism in a state active and provides a security code to the security mechanism; b. use at least a portion of the energy provided by the signal to evaluate the security code; c. compare the security code with an access code stored by the security mechanism; d. determine if the security code corresponds to the access code: and e. Release the access element with the security mechanism when the security code corresponds to the access code. 23. The method according to claim 22, further characterized in that it additionally comprises: a. releasing the access element by providing power from the security mechanism to the access element; and b. providing power to the access element from a rechargeable energy storage device within the security mechanism. 24. The method according to claim 22, further characterized in that it additionally comprises: a. moving the transmitter to a position where the security mechanism will not receive the transmitted signal; b. determine that the security mechanism is no longer receiving the signal for some time; c. secure the access element; d. place the security mechanism in the active state.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US59418605P | 2005-03-17 | 2005-03-17 | |
| PCT/US2006/009599 WO2006102019A2 (en) | 2005-03-17 | 2006-03-16 | Electronic proximity security system |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| MX2007011294A true MX2007011294A (en) | 2007-10-05 |
Family
ID=37024400
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| MX2007011294A MX2007011294A (en) | 2005-03-17 | 2006-03-16 | Electronic proximity security system. |
Country Status (6)
| Country | Link |
|---|---|
| US (1) | US20070257772A1 (en) |
| EP (1) | EP1866221A4 (en) |
| AU (1) | AU2006227478A1 (en) |
| CA (1) | CA2601862A1 (en) |
| MX (1) | MX2007011294A (en) |
| WO (1) | WO2006102019A2 (en) |
Families Citing this family (21)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP2125918B1 (en) | 2006-12-21 | 2012-06-27 | Dow Global Technologies LLC | Functionalized olefin polymers, compositions and articles prepared therefrom, and methods for making the same |
| US20090179758A1 (en) * | 2008-01-14 | 2009-07-16 | Squier Jason G | Site security system |
| US7515048B1 (en) | 2008-05-20 | 2009-04-07 | International Business Machines Corporation | Method and system for using RFID to automatically lock and unlock a mobile computing device |
| FR2937951B1 (en) | 2008-10-30 | 2011-05-20 | Airbus | SYSTEM FOR MONITORING AND LOCKING COMPARTMENT DOORS OF AN AIRCRAFT |
| US8434869B2 (en) * | 2009-07-03 | 2013-05-07 | Andrew P. Davis | Automated locking apparatus for a slit lamp |
| US11028635B2 (en) | 2013-02-06 | 2021-06-08 | Hornady Manufacturing Company | Firearm safety device |
| US9530266B2 (en) | 2013-02-06 | 2016-12-27 | Hornady Manufacturing Company | Handgun mini-vault |
| US20150084649A1 (en) * | 2013-09-26 | 2015-03-26 | L & P Property Management Company | Capacitive wire sensing for guarding applications |
| CH709621A2 (en) * | 2014-05-05 | 2015-11-13 | Die Schweizerische Post Ag | Locking device for a cover of a storage compartment. |
| GB2544946B (en) | 2014-08-31 | 2021-03-10 | Berestka John | Systems and methods for analyzing the eye |
| US9574375B2 (en) * | 2014-11-07 | 2017-02-21 | Kevin Henderson | Electronic lock |
| WO2018116282A1 (en) * | 2016-12-23 | 2018-06-28 | Innovative World Solutions, LLC | Integrated package and mail security system implementing enriched customer and delivery service capabilities |
| US10039400B2 (en) | 2016-12-23 | 2018-08-07 | Innovative World Solutions, LLC | Integrated package and mail delivery security system |
| US10736451B2 (en) | 2016-12-23 | 2020-08-11 | Imdss Solutions Llc | Integrated package and mail security system implementing enriched customer and delivery service capabilities |
| US20190066032A1 (en) * | 2017-08-22 | 2019-02-28 | Qualcomm Incorporated | Robotic Vehicle Item Delivery Security System |
| US10948263B2 (en) | 2017-12-01 | 2021-03-16 | Hornady Manufacturing Company | Long gun security storage container |
| US11319732B2 (en) * | 2018-08-17 | 2022-05-03 | Ford Global Technologies, Llc | Pre-fluxing motors of vehicle door e-latches |
| WO2020061221A1 (en) | 2018-09-21 | 2020-03-26 | Knox Associates, Inc. Dba Knox Company | Electronic lock state detection systems and methods |
| US11566868B2 (en) | 2019-11-21 | 2023-01-31 | Hornady Manufacturing Company | Firearm storage device |
| US11734974B2 (en) | 2021-04-21 | 2023-08-22 | Hornady Mannfacturing Company | Safe with biometric lock mechanism |
| GB2635586A (en) | 2023-11-07 | 2025-05-21 | Lightfield Medical Inc | Systems and methods for analyzing the eye |
Family Cites Families (33)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4270370A (en) * | 1978-11-20 | 1981-06-02 | Oftelie Phil C | Radio operated latch dead-bolting system |
| US4447005A (en) * | 1983-03-25 | 1984-05-08 | Kelly James B | Double door security rural mailbox with automatic signalling means |
| US6738697B2 (en) * | 1995-06-07 | 2004-05-18 | Automotive Technologies International Inc. | Telematics system for vehicle diagnostics |
| US5422632A (en) * | 1992-10-28 | 1995-06-06 | Intellitouch 2000, Inc. | Electronic security system |
| US5629981A (en) * | 1994-07-29 | 1997-05-13 | Texas Instruments Incorporated | Information management and security system |
| US5751224A (en) * | 1995-05-17 | 1998-05-12 | The Chamberlain Group, Inc. | Code learning system for a movable barrier operator |
| US6980655B2 (en) * | 2000-01-21 | 2005-12-27 | The Chamberlain Group, Inc. | Rolling code security system |
| US5723912A (en) * | 1996-04-25 | 1998-03-03 | Trw Inc. | Remote keyless entry system having a helical antenna |
| US5838257A (en) * | 1996-05-24 | 1998-11-17 | Trw Inc. | Keyless vehicle entry system employing portable transceiver having low power consumption |
| US5954264A (en) * | 1996-08-09 | 1999-09-21 | Keller; Louis D. | Rural mailbox with remote door opener |
| US5933090A (en) * | 1996-08-23 | 1999-08-03 | Ut Automotive Dearborn, Inc. | Method and apparatus for field programming a remote control system |
| US7106171B1 (en) * | 1998-04-16 | 2006-09-12 | Burgess James P | Keyless command system for vehicles and other applications |
| US5987818A (en) * | 1998-10-21 | 1999-11-23 | Dabideen; Pooran | Remotely controlled door locking and opening system |
| JP3648396B2 (en) * | 1998-12-02 | 2005-05-18 | トヨタ自動車株式会社 | Vehicle door handle |
| US6335576B1 (en) * | 1999-03-01 | 2002-01-01 | Trw Inc. | Remote keyless entry receiver having correctly matched transmitters |
| US6720866B1 (en) * | 1999-03-30 | 2004-04-13 | Microchip Technology Incorporated | Radio frequency identification tag device with sensor input |
| AU6217100A (en) * | 1999-07-15 | 2001-02-05 | Pinpoint Corporation | Method and apparatus for mobile tag reading |
| GB9927574D0 (en) * | 1999-11-22 | 2000-01-19 | Pbt Ip Limited | Valve incorporating active material |
| US6801134B1 (en) * | 2000-03-02 | 2004-10-05 | Trw Inc. | System and method for automatic function operation with controlled distance communication having vehicle-based frequency selection |
| US20020113695A1 (en) * | 2001-01-29 | 2002-08-22 | Nick Ernst | Automated remote control system for hotel in-room safes |
| EP1283503A3 (en) * | 2001-08-10 | 2004-05-26 | ArvinMeritor Light Vehicle Systems (UK) Ltd | Access control system and method |
| US6989732B2 (en) * | 2002-06-14 | 2006-01-24 | Sentrilock, Inc. | Electronic lock system and method for its use with card only mode |
| US20030231112A1 (en) * | 2002-06-18 | 2003-12-18 | Sun Microsystems, Inc., A Delaware Corporation | Secure parcel delivery with electronic notification and approval |
| EP1576297A4 (en) * | 2002-11-19 | 2006-11-22 | Telezygology Inc | Bolt assembly, method and device for release, and computer system |
| US6957767B2 (en) * | 2003-06-30 | 2005-10-25 | International Business Machines Corporation | RFID-keyed mailbox, and RFID-based system and method for securing a mailbox |
| WO2005010719A2 (en) * | 2003-07-24 | 2005-02-03 | The Braun Corporaton | Vehicle access control system with passive user interface |
| WO2005088559A1 (en) * | 2004-03-12 | 2005-09-22 | Dom-Sicherheitstechnik Gmbh & Co. Kg | Lock cylinder and locking method |
| US7222779B1 (en) * | 2004-05-04 | 2007-05-29 | Juan Ramon Pineda-Sanchez | Security mail box assembly |
| GB0417789D0 (en) * | 2004-08-10 | 2004-09-15 | Instr Ltd | Access control |
| US20060094466A1 (en) * | 2004-10-20 | 2006-05-04 | Bao Tran | Systems and methods for providing expansion to wireless communicators |
| US7249705B2 (en) * | 2004-11-29 | 2007-07-31 | Joseph Dudley | Theft preventative mailbox having remote unlocking activation mechanism |
| US7999656B2 (en) * | 2005-10-26 | 2011-08-16 | Sentrilock, Llc | Electronic lock box with key presence sensing |
| US20070132550A1 (en) * | 2005-12-08 | 2007-06-14 | Msystems Ltd. | Electromechanical Lock Device And Method |
-
2006
- 2006-03-16 MX MX2007011294A patent/MX2007011294A/en not_active Application Discontinuation
- 2006-03-16 US US11/377,448 patent/US20070257772A1/en not_active Abandoned
- 2006-03-16 AU AU2006227478A patent/AU2006227478A1/en not_active Abandoned
- 2006-03-16 EP EP06738635A patent/EP1866221A4/en not_active Withdrawn
- 2006-03-16 CA CA002601862A patent/CA2601862A1/en not_active Abandoned
- 2006-03-16 WO PCT/US2006/009599 patent/WO2006102019A2/en not_active Ceased
Also Published As
| Publication number | Publication date |
|---|---|
| AU2006227478A1 (en) | 2006-09-28 |
| EP1866221A4 (en) | 2009-07-01 |
| CA2601862A1 (en) | 2006-09-28 |
| US20070257772A1 (en) | 2007-11-08 |
| WO2006102019A3 (en) | 2007-09-07 |
| WO2006102019A2 (en) | 2006-09-28 |
| EP1866221A2 (en) | 2007-12-19 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| MX2007011294A (en) | Electronic proximity security system. | |
| CN104272353B (en) | Electron key, electronic locking system and the method for discharging access mandate | |
| ES2813578T3 (en) | Electronic lock and electronic locking system for furniture, cabinets or lockers | |
| US8354914B2 (en) | Reduced power electronic lock system | |
| KR20070100361A (en) | Universal hands-free key and lock system and method | |
| ES2734367T3 (en) | Closing unit, closing device and procedure for unlocking and / or locking a lock | |
| US20050029345A1 (en) | Integrated lock, drop-box and delivery system and method | |
| US7165428B2 (en) | Lock | |
| US20100171589A1 (en) | Access control system, and closing mechanism | |
| JP2011512044A (en) | Wireless energy self-sufficiency switch | |
| US20050086983A1 (en) | Locking device and electric lock, lock assembly, drop-box and delivery system and method including same | |
| AU2021323983A1 (en) | A lock for a bin and method of controlling access to a bin | |
| US20170370125A1 (en) | Electric lock device for furniture and storage | |
| CN108898713A (en) | A kind of theft preventing method of door-locking system | |
| JP2010165314A (en) | Entrance/exit management system | |
| KR102323784B1 (en) | Low power smart key lock system using rf signal | |
| JP5204676B2 (en) | Entrance / exit management system | |
| US20230230431A1 (en) | Electronic lock configured to receive wireless power transmissions | |
| KR20190065777A (en) | Contactless lock and method for locking and unlocking lock by using the same | |
| WO1997044557A1 (en) | Electronic apparatus for the electromagnetic release of a lock | |
| CN111466774A (en) | Key storage device and use method | |
| WO2025176919A1 (en) | Electronic lock with embedded mechatronic system for cascade actuation and self-supply | |
| HK1201969B (en) | Electronic key, electronic closure system and a method for allowing an access authorisation | |
| KR20100021746A (en) | Digital door lock with security apparatus | |
| JP2010165312A (en) | Entrance/exit management system |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| FA | Abandonment or withdrawal |